. "Instead a variety of authentication methods, such as certificates, Kerberos and public key authentication can be supported." . . .